Securing Androids In The Enterprise
Click here to download now
Overview: When Google created Android as an open source platform, it allowed any and all developers to modify it as they see fit. Event some wireless carriers include pre-installed software on their devices. As a result, there are a number of Android variations across the different makes, models and carriers of smartphones and tablets. The pace of innovation is driving the growth of the Android platform. It is now the leading smartphone platform in the world, and more than 300,000 are being enabled per hour.
There are more than 125 Android devices created by more than 30 manufacturers. In addition, there are more than 15 carriers in the market, and many of them install custom software on the devices they sell. This add sup to a lot of variation and fragmentation, which creates challenges for IT organizations from both a management and security standpoint.
In reality, Android is too popular to ignore. Organizations will simply have to deal with it, in all its permutations, by defining different segments of your user population so you can set up roles with different restrictions and privileges. IT will also need to manage each of the different types of applications (and which type you may want to completely restrict).
This white paper describes how IT departments can handle the Android device fragmentation dilemma, while maximize productivity and minimizing risk to the organization.